Home
last modified time | relevance | path

Searched refs:prctl (Results 1 – 25 of 117) sorted by relevance

12345

/OK3568_Linux_fs/kernel/Documentation/userspace-api/
H A Dspec_ctrl.rst16 :manpage:`prctl(2)`.
18 There are two prctl options which are related to this:
28 which is selected with arg2 of prctl(2). The return value uses bits 0-3 with
41 subsequent prctl(..., PR_SPEC_ENABLE) will fail.
49 available. If not set, prctl(PR_SET_SPECULATION_CTRL) for the speculation
58 is selected by arg2 of :manpage:`prctl(2)` per task. arg3 is used to hand
67 EINVAL The prctl is not implemented by the architecture or unused
68 prctl(2) arguments are not 0.
95 * prctl(PR_GET_SPECULATION_CTRL, PR_SPEC_STORE_BYPASS, 0, 0, 0);
96 * prctl(PR_SET_SPECULATION_CTRL, PR_SPEC_STORE_BYPASS, PR_SPEC_ENABLE, 0, 0);
[all …]
/OK3568_Linux_fs/kernel/tools/testing/selftests/seccomp/
H A Dseccomp_bpf.c325 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_STRICT, NULL, NULL, NULL); in TEST()
336 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_STRICT, NULL, NULL, NULL); in TEST_SIGNAL()
352 ret = prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0); in TEST()
363 ret = prctl(PR_SET_NO_NEW_PRIVS, 1, NULL, 0, 0); in TEST()
367 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, NULL, NULL, NULL); in TEST()
385 ret = prctl(PR_GET_NO_NEW_PRIVS, 0, NULL, 0, 0); in TEST()
390 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog, 0, 0); in TEST()
420 ret = prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0); in TEST()
427 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog, 0, 0); in TEST()
434 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog, 0, 0); in TEST()
[all …]
H A Dseccomp_benchmark.c161 ret = prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0); in main()
165 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &bitmap_prog); in main()
172 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &bitmap_prog); in main()
179 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog); in main()
186 ret = prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &bitmap_prog); in main()
/OK3568_Linux_fs/yocto/meta-rockchip/recipes-kernel/linux-libc-headers/linux-libc-headers_4.4-custom/
H A D0006-BACKPORT-arm64-Introduce-prctl-options-to-control-th.patch4 Subject: [PATCH] BACKPORT: arm64: Introduce prctl() options to control the
10 the kernel indiscriminately. This patch introduces a prctl() interface
13 testing user-space prctl() return error checking without reconfiguring
36 include/uapi/linux/prctl.h
43 include/uapi/linux/prctl.h | 5 +++++
46 diff --git a/include/uapi/linux/prctl.h b/include/uapi/linux/prctl.h
48 --- a/include/uapi/linux/prctl.h
49 +++ b/include/uapi/linux/prctl.h
/OK3568_Linux_fs/kernel/tools/testing/selftests/prctl/
H A Ddisable-tsc-test.c49 if ( prctl(PR_GET_TSC, &tsc_val) == -1) in sigsegv_cb()
55 if ( prctl(PR_SET_TSC, PR_TSC_ENABLE) == -1) in sigsegv_cb()
71 if ( prctl(PR_GET_TSC, &tsc_val) == -1) in main()
79 if ( prctl(PR_SET_TSC, PR_TSC_ENABLE) == -1) in main()
86 if ( prctl(PR_SET_TSC, PR_TSC_SIGSEGV) == -1) in main()
H A Ddisable-tsc-on-off-stress-test.c50 if (prctl(PR_SET_TSC, PR_TSC_ENABLE) < 0) in sigsegv_cb()
72 if (prctl(PR_SET_TSC, PR_TSC_SIGSEGV) < 0) in task()
H A Ddisable-tsc-ctxt-sw-stress-test.c46 if (prctl(PR_SET_TSC, PR_TSC_SIGSEGV) < 0) in segvtask()
67 if (prctl(PR_SET_TSC, PR_TSC_ENABLE) < 0) in rdtsctask()
/OK3568_Linux_fs/kernel/tools/testing/selftests/capabilities/
H A Dtest_execve.c105 if (prctl(PR_SET_KEEPCAPS, 1, 0, 0, 0) != 0) in create_and_enter_ns()
285 …if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_BIND_SERVICE, 0, 0, 0) != -1 || errno != E… in do_tests()
302 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_RAW, 0, 0, 0) != -1 || errno != EPERM) { in do_tests()
313 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) { in do_tests()
320 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, CAP_NET_BIND_SERVICE, 0, 0, 0) != 1) { in do_tests()
325 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_CLEAR_ALL, 0, 0, 0, 0) != 0) in do_tests()
329 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) { in do_tests()
335 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) in do_tests()
343 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_IS_SET, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) { in do_tests()
363 if (prctl(PR_CAP_AMBIENT, PR_CAP_AMBIENT_RAISE, CAP_NET_BIND_SERVICE, 0, 0, 0) != 0) in do_tests()
/OK3568_Linux_fs/yocto/meta-openembedded/meta-python/recipes-devtools/python/
H A Dpython3-prctl_1.8.1.bb1 SUMMARY = "Control process attributes through prctl"
2 DESCRIPTION = "The linux prctl function allows you to control specific characteristics of a \
14 SRC_URI = "git://github.com/seveas/python-prctl;protocol=https;branch=main \
/OK3568_Linux_fs/kernel/tools/perf/trace/beauty/
H A Dprctl_option.sh8 egrep $regex ${header_dir}/prctl.h | grep -v PR_SET_PTRACER | \
15 egrep $regex ${header_dir}/prctl.h | \
/OK3568_Linux_fs/kernel/Documentation/admin-guide/LSM/
H A DYama.rst30 For a solution, some applications use ``prctl(PR_SET_DUMPABLE, ...)`` to
39 ``prctl(PR_SET_PTRACER, pid, ...)`` can be used. An inferior can declare which
45 restrictions, it can call ``prctl(PR_SET_PTRACER, PR_SET_PTRACER_ANY, ...)``
55 ``prctl(PR_SET_DUMPABLE...)`` already). Similarly, ``PTRACE_TRACEME`` is
63 inferior can call ``prctl(PR_SET_PTRACER, debugger, ...)`` to declare
/OK3568_Linux_fs/kernel/Documentation/arm64/
H A Dmemory-tagging-extension.rst80 ``prctl(PR_SET_TAGGED_ADDR_CTRL, flags, 0, 0, 0)`` system call where ``flags``
95 ``prctl(PR_GET_TAGGED_ADDR_CTRL, 0, 0, 0, 0)`` system call.
121 in the randomly generated set using the ``prctl(PR_SET_TAGGED_ADDR_CTRL,
125 **Note**: The hardware uses an exclude mask but the ``prctl()``
147 bits in the ``flags`` argument to the ``prctl(PR_SET_TAGGED_ADDR_CTRL,
212 ``prctl()`` options described in
233 #include <sys/prctl.h>
246 * From include/uapi/linux/prctl.h
290 if (prctl(PR_SET_TAGGED_ADDR_CTRL,
294 perror("prctl() failed");
H A Dtagged-address-abi.rst69 explicitly enable it via ``prctl()`` as follows:
90 Calling ``prctl(PR_SET_TAGGED_ADDR_CTRL, PR_TAGGED_ADDR_ENABLE, 0, 0, 0)``
118 - ``prctl()`` other than pointers to user data either passed directly or
138 #include <sys/prctl.h>
152 if (!prctl(PR_SET_TAGGED_ADDR_CTRL, PR_TAGGED_ADDR_ENABLE, 0, 0, 0))
H A Dpointer-authentication.rst63 using the PR_PAC_RESET_KEYS prctl. A bitmask of PR_PAC_APIAKEY,
115 The prctl PR_PAC_SET_ENABLED_KEYS allows the user program to control which
118 and PR_PAC_APDBKEY specifying which keys shall be affected by this prctl,
122 prctl(PR_PAC_SET_ENABLED_KEYS,
135 prctl very early after establishing that a process may load legacy binaries,
/OK3568_Linux_fs/kernel/samples/seccomp/
H A Ddropper.c45 if (prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0)) { in install_filter()
49 if (prctl(PR_SET_SECCOMP, 2, &prog)) { in install_filter()
H A Dbpf-fancy.c88 if (prctl(PR_SET_NO_NEW_PRIVS, 1, 0, 0, 0)) { in main()
93 if (prctl(PR_SET_SECCOMP, SECCOMP_MODE_FILTER, &prog)) { in main()
/OK3568_Linux_fs/kernel/tools/testing/selftests/powerpc/pmu/
H A Dper_event_excludes.c74 prctl(PR_TASK_PERF_EVENTS_ENABLE); in per_event_excludes()
80 prctl(PR_TASK_PERF_EVENTS_DISABLE); in per_event_excludes()
H A Dcount_instructions.c35 prctl(PR_TASK_PERF_EVENTS_ENABLE); in do_count_loop()
40 prctl(PR_TASK_PERF_EVENTS_DISABLE); in do_count_loop()
H A Dcount_stcx_fail.c36 prctl(PR_TASK_PERF_EVENTS_ENABLE); in do_count_loop()
41 prctl(PR_TASK_PERF_EVENTS_DISABLE); in do_count_loop()
/OK3568_Linux_fs/kernel/tools/testing/selftests/arm64/fp/
H A Dvlset.c128 t = prctl(PR_SVE_SET_VL, vl | flags); in main()
135 t = prctl(PR_SVE_GET_VL); in main()
/OK3568_Linux_fs/kernel/tools/testing/selftests/arm64/mte/
H A Dcheck_gcr_el1_cswitch.c60 if (prctl(PR_SET_TAGGED_ADDR_CTRL, prctl_set, 0, 0, 0)) { in execute_thread()
65 prctl_get = prctl(PR_GET_TAGGED_ADDR_CTRL, 0, 0, 0, 0); in execute_thread()
/OK3568_Linux_fs/kernel/tools/perf/tests/
H A Dthread-map.c27 !prctl(PR_SET_NAME, NAMEUL, 0, 0, 0)); in test__thread_map()
94 !prctl(PR_SET_NAME, NAMEUL, 0, 0, 0)); in test__thread_map_synthesize()
H A Dkeep-tracking.c119 CHECK__(prctl(PR_SET_NAME, (unsigned long)comm, 0, 0, 0)); in test__keep_tracking()
141 CHECK__(prctl(PR_SET_NAME, (unsigned long)comm, 0, 0, 0)); in test__keep_tracking()
H A Dswitch-tracking.c486 err = prctl(PR_SET_NAME, (unsigned long)comm, 0, 0, 0); in test__switch_tracking()
499 err = prctl(PR_SET_NAME, (unsigned long)comm, 0, 0, 0); in test__switch_tracking()
512 err = prctl(PR_SET_NAME, (unsigned long)comm, 0, 0, 0); in test__switch_tracking()
525 err = prctl(PR_SET_NAME, (unsigned long)comm, 0, 0, 0); in test__switch_tracking()
/OK3568_Linux_fs/kernel/tools/testing/selftests/bpf/prog_tests/
H A Dtrampoline_count.c108 if (CHECK_FAIL(prctl(PR_GET_NAME, comm, 0L, 0L, 0L))) in test_trampoline_count()
111 CHECK_FAIL(prctl(PR_SET_NAME, comm, 0L, 0L, 0L)); in test_trampoline_count()

12345